Control: Ensure default Service account is not used for Project access in Kubernetes Engine clusters
Usage
Run the control in your terminal:
powerpipe control run gcp_compliance.control.disable_gke_default_service_account
Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run gcp_compliance.control.disable_gke_default_service_account --share
SQL
This control uses a named query:
kubernetes_cluster_service_account_default